Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:17482
HistoryJul 12, 2007 - 12:00 a.m.

US-CERT Technical Cyber Security Alert TA07-192A -- Adobe Flash Player Updates for Multiple Vulnerabilities

2007-07-1200:00:00
vulners.com
25

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                    National Cyber Alert System

            Technical Cyber Security Alert TA07-192A

Adobe Flash Player Updates for Multiple Vulnerabilities

Original release date: July 11, 2007
Last revised: –
Source: US-CERT

Systems Affected

Microsoft Windows, Apple Mac OS X, Linux, Solaris, or other operating
systems with any of the following Adobe products installed:
* Flash Player 9.0.45.0
* Flash Player 9.0.45.0 and earlier network distribution
* Flash Basic
* Flash CS3 Professional
* Flash Professional 8, Flash Basic
* Flex 2.0
* Flash Player 7.070.0 for Linux or Solaris

For more complete information, refer to Adobe Security Bulletin
APSB07-12.

Overview

There are critical vulnerabilities in Adobe Flash player and related
software. Exploitation of these vulnerabilities could allow a remote,
unauthenticated attacker to execute arbitrary code or cause a denial
of service on a vulnerable system.

I. Description

Adobe Security Bulletin APSB07-12 addresses vulnerabilities in Adobe
Flash Player and related software. Further information is available in
the US-CERT Vulnerability Notes database.

Several operating systems, including Microsoft Windows and Apple OS X,
have vulnerable versions of Flash installed by default. Systems with
Flash-enabled web browsers are vulnerable. To exploit these
vulnerabilities, an attacker could host a specially crafted Flash file
on a web site and convince a user to visit the site.

II. Impact

A remote, unauthenticated attacker could execute arbitrary code with
the privileges of the user, steal credentials, or create a
denial-of-service condition. If the user is logged on with
administrative privileges, the attacker could take complete control of
an affected system.

III. Solution

Apply Updates

Check with your vendor for patches or updates. For information about a
specific vendor, please see the Systems Affected section in the
vulnerability notes or contact your vendor directly. If you get the
flash player from Adobe, see the Adobe Get Flash page for information
about updates.

Disable Flash

Users who are unable to apply the patch should disable Flash. Contact
your vendor or see the US-CERT Vulnerability Notes VU#110297,
VU#730785, or VU#138457 for more details.

Appendix A. References

<http://www.kb.cert.org/vuls/byid?searchview&amp;query=VU&#37;23138457,VU&#37;2323110297,VU&#37;23730785&gt;


The most recent version of this document can be found at:

 &lt;http://www.us-cert.gov/cas/techalerts/TA07-192A.html&gt;

Feedback can be directed to US-CERT Technical Staff. Please send
email to &lt;[email protected]&gt; with &quot;TA07-192A Feedback VU#730785&quot; in the
subject.

For instructions on subscribing to or unsubscribing from this
mailing list, visit &lt;http://www.us-cert.gov/cas/signup.html&gt;.

Produced 2007 by US-CERT, a government organization. Terms of use

Terms of use:

 &lt;http://www.us-cert.gov/legal.html&gt;

Revision History

July 11, 2007: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRpU9ffRFkHkM87XOAQKltggAm5ZRfQ8tfM+0WGcNtMPCxjHyWfX3VNNt
8Q6rkAkft8LcP0ek7dRs4kxfvEz4RHWmT+6J/tUeG/X8DoBZKcjbe/c/Vh0gLQYN
xKlAUXGjThWuTeoUmKwZkDQTdlwR1Y3E/LpjUKxoErANuLsgsHQkyvM8lDw+qBY6
TzynZFOSR0ZNjS7IpP945dkaFEbxY5gYGYi19/0FbgRMfcMLEkSmOrWIc5n58U1U
IOQ/1gtZIWsNBR50Xrjs6avfSHNR7kTYXSMoSupZkuBGoapwwmYp/cVh1KPYJRjt
jc0IaQbcGA80o22TJ1yyYroF8x5oUVpzLqJBcZSJLHWUMSXxB4Bv3g==
=yQt6
-----END PGP SIGNATURE-----